close

Key Privacy Predictions for 2019

2018 was a significant year marked by its major data protection scandals and the practical implementation of the GDPR. It’s only recently that some organizations have become aware that they must invest serious time and effort in data protection and priva...

There’s no perfect defense against cyber-attacks, so what do you do?

You no doubt remember when WannaCry ransomware infected computers around the world in May 2017. You may also remember the data leak that occurred at the Japan pension fund after a targeted malware attack. These are just two examples of cyber-attacks.  There a...

The BaseStriker phishing attack is back – targeting CEOs

The Fujitsu Cyber Threat Intelligence (CTI) Team have recently observed the BaseStriker security fla...

It’s time to take a look at your security posture

The cyber security business can be a commoditized game – with vendors all eyeing each other, in th...

zero trust security

What is Zero Trust Security and How Can it be Used for Hybrid IT?

As complexity increases in a Hybrid IT world, traditional approaches to security are no longer fit f...